CVE-2009-0252

Enthrallweb eReservations - SQL Injection

Title source: llm
STIX 2.1

Description

Multiple SQL injection vulnerabilities in default.asp in Enthrallweb eReservations allow remote attackers to execute arbitrary SQL commands via the (1) Login parameter (aka username field) or the (2) Password parameter (aka password field). NOTE: some of these details are obtained from third party information.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ByALBAYX · textwebappsasp
https://www.exploit-db.com/exploits/7801

References (5)

Core 5
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/33578
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://osvdb.org/51456
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/33321
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/48062
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/7801

Scores

EPSS 0.0049
EPSS Percentile 65.8%

Details

CWE
CWE-89
Status published
Products (1)
enthrallweb/ereservations
Published Jan 22, 2009
Tracked Since Feb 18, 2026